Unknown

Dataset Information

0

Zero-knowledge identity authentication for internet of vehicles: Improvement and application.


ABSTRACT: The popularity of Internet of Vehicles (IoV) has made people's driving environment more comfortable and convenient. However, with the integration of external networks and the vehicle networks, the vulnerabilities of the Controller Area Network (CAN) are exposed, allowing attackers to remotely invade vehicle networks through external devices. Based on the remote attack model for vulnerabilities of the in-vehicle CAN, we designed an efficient and safe identity authentication scheme based on Feige-Fiat-Shamir (FFS) zero-knowledge identification scheme with extremely high soundness. We used the method of zero-one reversal and two-to-one verification to solve the problem that FFS cannot effectively resist guessing attacks. Then, we carried out a theoretical analysis of the scheme's security and evaluated it on the software and hardware platform. Finally, regarding time overhead, under the same parameters, compared with the existing scheme, the scheme can complete the authentication within 6.1ms without having to go through multiple rounds of interaction, which reduces the additional authentication delay and enables all private keys to participate in one round of authentication, thereby eliminating the possibility that a private key may not be involved in the original protocol. Regarding security and soundness, as long as private keys are not cracked, the scheme can resist guessing attacks, which is more secure than the existing scheme.

SUBMITTER: Han M 

PROVIDER: S-EPMC7521753 | biostudies-literature | 2020

REPOSITORIES: biostudies-literature

altmetric image

Publications

Zero-knowledge identity authentication for internet of vehicles: Improvement and application.

Han Mu M   Han Mu M   Yin Zhikun Z   Cheng Pengzhou P   Zhang Xing X   Ma Shidian S  

PloS one 20200928 9


The popularity of Internet of Vehicles (IoV) has made people's driving environment more comfortable and convenient. However, with the integration of external networks and the vehicle networks, the vulnerabilities of the Controller Area Network (CAN) are exposed, allowing attackers to remotely invade vehicle networks through external devices. Based on the remote attack model for vulnerabilities of the in-vehicle CAN, we designed an efficient and safe identity authentication scheme based on Feige-  ...[more]

Similar Datasets

| S-EPMC8777787 | biostudies-literature
| S-EPMC6386933 | biostudies-literature
| S-EPMC6753141 | biostudies-literature
| S-EPMC7495184 | biostudies-literature
| S-EPMC9044221 | biostudies-literature
| S-EPMC9333255 | biostudies-literature
| S-EPMC6679261 | biostudies-literature
| S-EPMC8575280 | biostudies-literature
| S-EPMC4054728 | biostudies-other
| S-EPMC7308874 | biostudies-literature